Method and system for protecting a computer system during boot operation
a computer system and boot operation technology, applied in the field of computer security systems, can solve the problems of unwanted, potentially harmful, unsolicited data traffic, internet has become, and is a target for intruders seeking to obtain unauthorized access or even outright control of the computer system
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039]One form of software security architecture for an IPS (“Intrusion Prevention System”) or IDS (“Intrusion Detection System”) according to the embodiments of the present invention includes three main components, namely “Security Center”, “Deep Security Manager (DSM)”, and “Agent”, wherein:
“Security Center” is the server where IPS Filters, Detection Rules and Expressions are defined;
“DSM” is the server portion that runs within an enterprise to communicate to the Security Center to receive updates, run the Recommendation Engine, query the Agents, and distribute security configuration to the Agents; and
“Agent” is the software that performs the IPS / IDS operations on the computer system.
[0040]As is known in the art, the boot operation of a computer system primarily involves copying the operating system components from a storage device into main memory, so that it can be executed by one or more CPUs (Central Processing Units). The period of boot operation is typically considered compl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


